Threat Database Adware Outfire Browser

Outfire Browser

By GoldSparrow in Adware

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 7
First Seen: September 14, 2016
Last Seen: December 11, 2020
OS(es) Affected: Windows

The Outfire Browser is a fake version of the Google Chrome Web browser that has been linked to a recent threat campaign. The Outfire Browser has gained notoriety because of its use of a new technique, known as UAC bypass, to infiltrate the computer users' machines and install the Outfire Browser. If the Outfire Browser has been installed on your computer, it is important to understand that the Outfire Browser is a bogus version of the Google Chrome Web browser that is mainly designed to expose its victims to advertising material. Most importantly, the presence of the Outfire Browser may indicate that your computer was compromised by the Outfire Browser's associated Trojan infection, which may indicate the presence of other threats or issues on the targeted computer.

The Outfire Browser and Its Associated Threat Campaign

The Trojan associated with the Outfire Browser is known as Mutabaha. It appears that the Outfire Browser uses a technique used as UAC bypass to install the Outfire Browser on the targeted computer. When the Outfire Browser is installed, it replaces the victim's Google Chrome Web browser. The Outfire Browser, in fact, is very closely related to Google. The Outfire Browser is based on Chromium and looks very similar to Google. However, it has been heavily modified by the people responsible for this attack so as to deliver advertisements and carry out other unwanted tasks on the user's computer. PC security analysts strongly advise computer users to avoid using the Outfire Browser. However, since the Outfire Browser resembles Google Chrome closely, many computer users may not be aware that the Outfire Browser is being used in the attack.

Tracking the Mutabaha Trojan Infection and Its Resulting Outfire Browser Installation

The Mutabaha campaign was first observed between August 15 and 18 of 2016. It is unknown exactly how the Outfire Browser is being distributed to victim's computers currently. However, the method used by the Outfire Browser in its attack is fairly well-known now. The Outfire Browser uses the UAC bypass to execute harmful commands on the user's computer while bypassing the Windows User Account Control (UAC), therefore not causing the appearance of an error message or alert.

PC security analysts recently discovered the UAC bypass technique used by Mutabaha on August 15. It seems that this attack takes advantage of the Windows Event Viewer's capacity to bypass the UAC alerts and any protective feature on the victim's computer. Only a couple of days after the UAC bypass technique method was discovered and published, the Mutabaha attack, using this method to infect the victim's computer with threats, started to appear in the wild. During its attack, Mutabaha uses a system Registry key to launch a program with abnormal user privileges that then downloads and installs a BAT file and a Trojan dropper. The Trojan dropper download and installs the Outfire Browser on the victim's computer, and then the BAT file will delete the Trojan dropper to obfuscate the method of attack.

The Outfire Browser’s Corrupted Web Browser Itself

The Outfire Browser is designed to replace Google Chrome on the victim's computer. During the Trojan attack, the Outfire Browser is installed, and any trace of the Trojan dropper is deleted automatically. The Outfire Browser is associated with a Windows Registry entry that allows the Outfire Browser to run automatically and persist on the victim's computer when Windows restarts. Registry modifications associated with the Outfire Browser also will delete Google Chrome shortcuts and import Chrome settings into the Outfire Browser to further hide that the Outfire Browser is not a legitimate Web browser. While being installed, the Outfire Browser will kill all file processes associated with other known Web browsers.

Trending

Most Viewed

Loading...